The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SSIRI"( http://dblp.L3S.de/Venues/SSIRI )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ssiri

Publication years (Num. hits)
2008 (51) 2009 (71) 2010 (28) 2011 (25)
Publication types (Num. hits)
inproceedings(171) proceedings(4)
Venues (Conferences, Journals, ...)
SSIRI(175)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 310 occurrences of 251 keywords

Results
Found 175 publication records. Showing 175 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1 Fifth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2011, 27-29 June, 2011, Jeju Island, Korea Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  BibTeX  RDF
1Ennan Zhai, Liping Ding, Sihan Qing Towards a Reliable Spam-Proof Tagging System. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mahmuda Asrafi, Huai Liu, Fei-Ching Kuo On Testing Effectiveness of Metamorphic Relations: A Case Study. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jianwen Xiang, Kazuo Yanoo, Yoshiharu Maeno, Kumiko Tadano Automatic Synthesis of Static Fault Trees from System Models. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Seok-Won Lee Probabilistic Risk Assessment for Security Requirements: A Preliminary Study. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jong-Phil Kim, Jang-Eui Hong Dynamic Service Replacement to Improve Composite Service Reliability. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Flora Amato, Massimo Felici, Paola Lanzi, Giulia Lotti, Luca Save, Alessandra Tedeschi Trust Observations in Validation Exercises. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Selim Ciraci, Hasan Sözer, Mehmet Aksit, Wilke Havinga Execution Constraint Verification of Exception Handling on UML Sequence Diagrams. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael Eonsuk Shin, Snehadeep Sethia, Nipul Patel Component-Based Malicious Software Engineer Intrusion Detection. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Andy Restrepo, W. Eric Wong Validation of SDL-Based Architectural Design Models: New Coverage Criteria. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tugkan Tuglular, Gurcan Gercek Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohammad Hamdaqa, Ladan Tahvildari ReLACK: A Reliable VoIP Steganography Approach. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lirong Dai, Yan Bai An Organization-Driven Approach for Enterprise Security Development and Management. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mirco Kuhlmann, Karsten Sohr, Martin Gogolla Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sangsig Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park, Suntae Kim A Feature-Based Modeling Approach for Building Hybrid Access Control Systems. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shih-Chien Chou Using Partial Ordered Numbers to Control Information Flows. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bing-Han Li, Shiuhpyng Shieh RELEASE: Generating Exploits Using Loop-Aware Concolic Execution. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Omar el Ariss, Jianfei Wu, Dianxiang Xu Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1JingZheng Wu, Liping Ding, Yongji Wang 0002, Wei Han A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1W. Eric Wong, Andrea Demel, Vidroha Debroy, Michael F. Siok Safe Software: Does It Cost More to Develop? Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Arjan J. de Roo, Hasan Sözer, Mehmet Aksit Runtime Verification of Domain-Specific Models of Physical Characteristics in Control Software. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Changzhi Zhao, Wei Dong 0006, Martin Leucker, Zhichang Qi Security Goals Assurance Based on Software Active Monitoring. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1HyeonJeong Kim, Doo-Hwan Bae, Vidroha Debroy, W. Eric Wong Deriving Data Dependence from/for UML State Machine Diagrams. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Aida Omerovic, Bjørnar Solhaug, Ketil Stølen Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ki-Seong Lee, Chan-Gun Lee Model-Driven Monitoring of Time-Critical Systems Based on Aspect-Oriented Programming. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yuzhang Feng, Yang Liu 0003, Yuan-Fang Li, Daqing Zhang 0001 Discovering Anomalies in Semantic Web Rules. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Semantic Web, Logic Programming
1Rui Peng, Q. P. Hu, Szu Hui Ng, Min Xie 0001 Testing Effort Dependent Software FDP and FCP Models with Consideration of Imperfect Debugging. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Imperfect debugging, software reliability, testing effort
1Christof J. Budnik, Rajesh Subramanyan, Raj Tanikella Scalable V&V Effort Estimation for Ultra-Large-Scale Systems. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Verification & Validation, Effort Estimation
1Jinxia An, Jihong Zhu 0001 Software Reliability Modeling with Integrated Test Coverage. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF integrated test coverage, modeling, classification, software reliability, test coverage, test effectiveness
1W. Eric Wong, Vidroha Debroy, Adithya Surampudi, HyeonJeong Kim, Michael F. Siok Recent Catastrophic Accidents: Investigating How Software was Responsible. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF catastrophic accidents, mishaps, safety-critical software systems, Software safety
1Xiangyu Luo, Yun Wang Recoverability of Erasure Codes Based and Intensively Written Storage Systems. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF mutable storage system, partial update, consistency, erasure-codes, Recoverability
1Odair Jacinto da Silva, Adalberto Nobiato Crespo, Marcos Lordello Chaim, Mário Jino Sensitivity of Two Coverage-Based Software Reliability Models to Variations in the Operational Profile. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF software test, software reliability, test coverage, operational profile, testing criteria
1Jim Woodcock 0001, Marcel Oliveira, Alan Burns 0001, Kun Wei Modelling and Implementing Complex Systems with Timebands. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Mohammad Zulkernine PhishTester: Automatic Testing of Phishing Attacks. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF application behavior model, heuristic coveage, finite state machine, Phishing, cross site scripting
1Xian Zhang, Yang Liu 0003, Mikhail Auguston Modeling and Analyzing Timed Security Protocols Using Extended Timed CSP. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Constraint Logic Programm, verifictaion, Security Protocol, extension, Timed CSP
1Kenji Taguchi 0001, Nobukazu Yoshioka, Takayuki Tobita, Hiroyuki Kaneko Aligning Security Requirements and Security Assurance Using the Common Criteria. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, requirements, assurance, Common Criteria
1Anh Tuan Luu, Man Chun Zheng, Thanh Tho Quan Modeling and Verification of Safety Critical Systems: A Case Study on Pacemaker. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF PAT, model checking, verification, Pacemaker
1Junhua Ding, Tong Wu, Jun Q. Lu, Xin-Hua Hu Self-Checked Metamorphic Testing of an Image Processing Program. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF test coverage criteria, image processing, structural testing, metamorphic testing
1Kun Tian, Kendra M. L. Cooper, Kang Zhang 0001, Siyuan Liu Towards a New Understanding of Advice Interference. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Advice Interference, Aspect Oriented Programming, Aspect Interference
1Shao Jie Zhang, Yang Liu 0003 Model Checking a Lazy Concurrent List-Based Set Algorithm. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Concurrent List-Based Set Algorithm, PAT, Linearizability, Refinement Checking
1Thein Than Tun, Yijun Yu, Charles B. Haley, Bashar Nuseibeh Model-Based Argument Analysis for Evolving Security Requirements. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Security argumentation, OpenPF, Requirements Engineering, Evolution, Event Calculus
1Shaoying Liu, Shin Nakajima 0001 A Decompositional Approach to Automatic Test Case Generation Based on Formal Specifications. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Formal specification, Specification-based testing, Automatic test case generation
1Jing Cao, Albert Nymeyer The 'Best' Valid Safe Protocol Converter. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF protocol converter, verification, component reuse, SoC design
1Fevzi Belli, Axel Hollmann, W. Eric Wong Towards Scalable Robustness Testing. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF elementary modification operators, decision tables, robustness testing, event sequence graphs
1Zhen Ming Jiang, Alberto Avritzer, Emad Shihab, Ahmed E. Hassan, Parminder Flora An Industrial Case Study on Speeding Up User Acceptance Testing by Mining Execution Logs. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Execution logs, Mining Repositories, Reliability
1Dae-Yeob Kim, Cheong Youn Traceability Enhancement Technique through the Integration of Software Configuration Management and Individual Working Environment. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cooperative management, traceability, version control, software configuration management, workspace
1Moussa Ouedraogo, Haralambos Mouratidis, Djamel Khadraoui, Eric Dubois 0001 An Agent-Based System to Support Assurance of Security Requirements. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Security assurance, Secure Tropos, multi-agents systems, Security requirements, security verification
1Fevzi Belli, Mutlu Beyazit A Formal Framework for Mutation Testing. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF (model-based) mutation testing, formal/regular grammar, manipulation operator, test generation, directed graph, test coverage
1May Tar Hla Myint, Thandar Thein Availability Improvement in Virtualized Multiple Servers with Software Rejuvenation and Virtualization. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Atef Mohamed, Mohammad Zulkernine Failure Type-Aware Reliability Assessment with Component Failure Dependency. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF component failure dependency, multi-mode failure, fault tolerance, reliability assessment, Component-based software systems
1Fazle Rabbi 0001, Hao Wang 0003, Wendy MacCaull YAWL2DVE: An Automated Translator for Workflow Verification. Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF model checking, formal verification, workflow management, YAWL
1 Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010 Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  BibTeX  RDF
1Senthil Kumar Chandran, Aleksandar Dimov, Sasikumar Punnekkat Modeling Uncertainties in the Estimation of Software Reliability . Search on Bibsonomy SSIRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner Java Card Performance Optimization of Secure Transaction Atomicity Based on Increasing the Class Field Locality. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Anti-Tearing, Transaction Mechanism, Java Annotations, Java Card
1Uttiya Basu Position Statement: Evolving Software Models for Global Organizations. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Aida Omerovic, Ketil Stølen Simplifying Parametrization of Bayesian Networks in Prediction of System Quality. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Prasad Bokil, Priyanka Darke, Ulka Shrotri, R. Venkatesh 0001 Automatic Test Data Generation for C Programs. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Modified Condition/Decision coverage (MCDC), Automatic Test data generation
1Bhavani Thuraisingham Security Engineering: Developments and Directions. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Binbin Qu, Yin Huang, Xiaodong Xie, Yansheng Lu A Developed Dynamic Environment Fault Injection Tool for Component Security Testing. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1David Kammler, Junqing Guan, Gerd Ascheid, Rainer Leupers, Heinrich Meyr A Fast and Flexible Platform for Fault Injection and Evaluation in Verilog-Based Simulations. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marcin Barylski, Henryk Krawczyk Multidimensional Approach to Quality Analysis of IPSec and HTTPS Applications. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hichem Boudali, Hasan Sözer, Mariëlle Stoelinga Architectural Availability Analysis of Software Decomposition for Local Recovery. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Haibo Yu 0001, Tsunenori Mine, Makoto Amamiya Semantic ACP2P Information Retrieval Method. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Information Retrieval, Multi-agent System, Peer-to-Peer, Semantic Desktop
1Pradeep Varma Anchored Text for Software Weaving and Merging. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software weaving, multi-dimensional separation of concerns (MDSOC), simultaneous concerns, highly-concurrent, porting concerns, refactoring, atomic registers, anchored text, software merging
1Ying Jiang, Ying-Na Li, Shan-Shan Hou, Lu Zhang 0023 Test-Data Generation for Web Services Based on Contract Mutation. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Contract Mutation, Web Services, Test-Data Generation
1Rudolf Siebenhofer Complexity - Interoperability - Deployment of Software. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ryan Q. Hankins, Tetsutaro Uehara, Jigang Liu A Comparative Study of Forensic Science and Computer Forensics. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Forensic Science, Computer Forensics, Comparative Study
1Xinhuai Tang, Sizhe Sun, Xiaozhou Yuan, Delai Chen Automated Web Service Composition System on Enterprise Service Bus. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Fuyuan Zhang, Zhengwei Qi, Haibing Guan, Xuezheng Liu, Mao Yang, Zheng Zhang 0001 FiLM: A Runtime Monitoring Tool for Distributed Systems. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distributed systems, finite automata, runtime monitoring, LTL
1Ryan Q. Hankins, Tetsutaro Uehara, Jigang Liu A Turing Machine-Based Model for Computer Forensic Reconstruction. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jeff Offutt Automatic Test Data Generation : Who, When and Where ?. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Frances Paulisch Reliability for Software-Based Systems. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jin-Cherng Lin, Jan-Min Chen, Chou-Chuan Chen, Yu-Shu Chien A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and Defense. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Minimax Theorem, Game Theory, Network Security
1Pejman Salehi, Ferhat Khendek, Maria Toeroe, Abdelwahab Hamou-Lhadj, Abdelouahed Gherbi Checking Service Instance Protection for AMF Configurations. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Availability Management Framework, Service Instance Protection, Complexity, Validation, Configurations
1Lirong Dai Security Variability Design and Analysis in an Aspect Oriented Software Architecture. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security variability design and analysis, software architecture, aspect oriented
1Chunxiang Xu, Hanpin Wang, Wanling Qu, Meixia Zhu, Yu Huang 0004 A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination Semantics. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jing Du 0001, Ye Yang, Qing Wang 0001 An Analysis for Understanding Software Security Requirement Methodologies. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Requirement Methodology, Literature Review and Analysis, Software, Security Requirement
1Ming-Jheng Li, Ying-Hsuan Chang, Justie Su-tzu Juan Efficient Multi-secret Sharing Scheme Using Room Square. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF room square, multi-use, multi-secret, secret sharing scheme
1Jifeng He 0001 Probabilistic Programming With Coordination and Compensation. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xucheng Tang, Beijun Shen Extending Model Driven Architecture with Software Security Assessment. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Software Security Assessment, Model-driven Architecture
1Bao Tang Panel: Increase Industry and Academy Cooperation in Testing Technologies and Tools for Critical Industry Applications. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Madhu Kilari, Qiyu Huang, Tongdan Jin Six-Sigma Based Performance Verification in Early Development of Automatic Test Equipment. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Design for Six-Sigma, Measurement Uncertainty, Performance Verification
1Jueliang Hu, Zuohua Ding, Geguang Pu Path-Based Approach to Integration Testing. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Program Slicing, Integration Testing, Path Analysis
1Lili Diao, Hao Wang 0013 A Safe Approach to Shrink Email Sample Set while Keeping Balance between Spam and Normal. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anti-spam, machine learning, SVM
1Tugkan Tuglular, Özgür Kaya, Can Arda Muftuoglu, Fevzi Belli Directed Acyclic Graph Modeling of Security Policies for Firewall Testing. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Firewall Policies, Firewall Testing, Firewalls, Directed Acyclic Graphs, Security Testing, Event Sequence Graphs
1JeeHyun Hwang, Tao Xie 0001, Vincent C. Hu Detection of Multiple-Duty-Related Security Leakage in Access Control Policies. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Validation, Access Control Policies, Policy Verification
1Chao Xu, Jinghui Gu, Ling Lin, Alei Liang, Haibing Guan CacheBit: A Multisource-Multitarget Cache Instrumentation Tool. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cahce simulating, instrumentation, dynamic binary translation
1Ching-Fan Lee, Justie Su-tzu Juan An Efficient and Secure Multi-secret Image Sharing Scheme with General Access Structure. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF (t, n)-threshold secret sharing scheme, multi-secret, multi-use, general access structure, share
1Mao Boying Position Statement: Evolving Software Models for Global Organizations. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rudolf Siebenhofer Systematic Cooperation between Industry and Universities . Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Qiang Zhang, Yuan Luo 0003, Chuliang Weng, Minglu Li 0001 A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Profile Injection Attacks, Trust, Recommender Systems
1Anmin Xie, Guodong Chen, Yonggang Wang, Zhong Chen 0001, Jian-bin Hu A New Method to Generate Attack Graphs. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF host access graph, sub-attack graph, network security, attack graphs
1Kun Tian, Kendra M. L. Cooper, Kang Zhang 0001, Huiqun Yu A Classification of Aspect Composition Problems. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF aspect composition problems, aspect conflicts, aspect interference
1 Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009 Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  BibTeX  RDF
1Rajesh Subramanyan Panel Description: Evolving Software Models for Global Organizations. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alessandro Basso, Alexander Bolotov, Vladimir Getov Temporal Specification and Deductive Verification of a Distributed Component Model and Its Environment. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Grid Component Model, Grid IDE, Automated Reconfiguration, Formal Specification, Deductive Reasoning
1Sathish Pinagapani, Dianxiang Xu, Jun Kong A Comparative Study of Access Control Languages. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF JAAS, authentication, access control, software metrics, authorization, XACML, ACL
1Lingyun Ying, Purui Su, Dengguo Feng, Xianggen Wang, Yi Yang 0040, Yu Liu ReconBin: Reconstructing Binary File from Execution for Software Analysis. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software security analysis, binary analysis, execution monitoring, malware analysis
1Yong Li, Yu Zhang 0086, Yiyun Chen, Ming Fu On the Verification of Strong Atomicity in Programs Using STM. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF transactional memory, proof-carrying code, strong atomicity
1Ajit Srividya, Kovur Krishna Mohan, Ajit Kumar Verma Improvement of QoS in Process Centric Software Development Using ANP. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Quality of service, Software Development, Rational Unified Process, Analytical Network Process
Displaying result #1 - #100 of 175 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license